Zero-Day Events Threat actors are able to attack at will because of zero-day vulnerabilities. Protecting networks and information is hard, and zero-day events make security even harder. Zero-day events are vulnerabilities which are previously unknown or which have no patch available.² These are often exploited by foreign threat actors. Threat actors often scan networks and catalog exposed networks and applications. When a zero-day vulnerability is published then, it is very quick and simple for the threat actor to search their database, find a vulnerable company and exploit the vulnerability. Over the past several years, the number of zero-days tracked by the National Institute for Standards and Technology (NIST) has skyrocketed: ³ 17 NEBRASKA BANKER
RkJQdWJsaXNoZXIy MTg3NDExNQ==